Security Week 39: XcodeGhost, the leak of D-Link certificates, $1M for bugs in iOS9
Today’s weekly news digest covers the stories about various mistakes in coding, and how they can be used for different purposes, including earning money.
188 articles
Today’s weekly news digest covers the stories about various mistakes in coding, and how they can be used for different purposes, including earning money.
Our today’s weekly news digest covers three stories about the mistakes coders make when programming robots, the way other people exploit those design flaws, and then the reckoning.
Cyber-literate users possesses a variety of good habits, which protect them online and offline. What are these traits?
Information security digest: the greatest iOS theft, farewell to RC4 cipher, multiple vulnerabilities in routers
Infosec digest: exploit kit Neutrino in Wordpress, yet another GitHub DDoS, Wyndham responsible for breach, while Target is not
One can find a number of reasons why this very bug cannot be patched right now, or this quarter, or, like, ever. Yet, the problem has to be solved.
Merely 23 years ago Microsoft released Windows 3.1 operating system, Apple showed its first iPhone PDA, and Linus Torvalds released Linux under GNU license. Eugene Kaspersky published the book with
Researchers compete at finding security holes in infotainment systems of connected cars and breaking in. The new case proves that Tesla does care a lot about security at wheel.
Recently we wrote about the Jeep Cherokee hack incident. At Black Hat security researchers Charlie Miller and Chris Valasek finally explained, how exactly the now-famous Jeep hack happened.
Online password managers can make your life much easier by automatically entering individual passwords for each website and service you have an account for. It’s a convenient tool. That is,
It’s the beginning of February and we’ve already seen three Adobe Flash zero days, an Internet wide-vulnerability in Linux and our first massive data breach of Anthem Inc., an enormous
Talk Security podcast hosts Brian Donohue and Chris Brook are back with the news edition of the Talk Security podcast, discussing the Regin APT attack platform and the movement toward
Unpatched flaws in Android make your device vulnerable to “Invisible” infection. You better find out now in order to protect yourself.
Car hacking is back and Charlie Miller and Chris Valasek no longer have to plug their computers into the cars to make them do their bidding.
Making a case for password reuse, Google hiring hackers to fix the Internet, Apple bolsters security across its services with strong Crypto, plus various fixes and more.
This week: the first mobile malware turns 10; we check in on Android security news and recent data breaches; and we fill you in on the week’s patches.
Many Internet-connected smart home systems contain vulnerabilities that could expose the owners of those systems to physical and digital theft.
An apparent flaw in Apple’s new operating system for its mobile devices allows anyone to access a user’s contact information and social media accounts without entering the security code to
David Lenoe, Adobe PSIRT group manage, discusses the Sandbox bypass press release which offered only partial disclosure, leaving much to be left unaddressed in terms of potential vulnerabilities. [youtube http://www.youtube.com/watch?v=kMnF3xDnAQg&feature=youtu.be?rel=0]
Software vulnerabilities are published every day, by the hundreds, and most users don’t think much about them, aside from them time it takes them to update their software. But when